Skip to main content
Log in

Coordinated and controlled mobility of multiple sinks for maximizing the lifetime of wireless sensor networks

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

We define scalable models and distributed heuristics for the concurrent and coordinated movement of multiple sinks in a wireless sensor network, a case that presents significant challenges compared to the widely investigated case of a single mobile sink. Our objective is that of maximizing the network lifetime defined as the time from the start of network operations till the failure of the first node. We contribute to this problem providing three new results. We first define a linear program (LP) whose solution provides a provable upper bound on the maximum lifetime possible for any given number of sinks. We then develop a centralized heuristic that runs in polynomial time given the solution to the LP. We also define a deployable distributed heuristic for coordinating the motion of multiple sinks through the network. We demonstrate the performance of the proposed heuristics via ns2-based simulations. The observed results show that our distributed heuristic achieves network lifetimes that are remarkably close to the optimum ones, resulting also in significant improvements over the cases of deploying the sinks statically, of random sink mobility and of heuristics previously proposed for restricted sink movements.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Notes

  1. Definitions of network lifetime vary, and depend on applications. In this paper we adopt the widely used definition introduced in [2] and used in many works (see [3, 4] and references therein) where lifetime is defined as the time until the failure (here for energy depletion) of the first node. This definition may seem too pessimistic, and many advocate definitions based on the failure of a certain percentage of the nodes. However, robust, energy-efficient protocols for WSNs tend to balance energy consumption among the nodes. So when the first node dies, many other nodes are also about to die.

  2. One might expect that an optimal schedule will use all stationary sinks at all times. However, there may be times when it is best not to use one even if it is available. This is because the extra sink will affect packet routes, possibly affecting energy balance negatively.

  3. If the protocol involves a training phase, i.e., a phase through which the sensors and the sinks learn about parameters needed to start protocol operations, e p is the energy after the training.

  4. Holding major configurations for a longer time allows routes to stabilize and run for enough time to justify the cost of changing the configuration.

  5. Note that these weights are a metric. Weighting only by the number of transient states does not satisfy the triangle inequality.

References

  1. Yick, J., Mukherjee, B., & Ghosal, D. (2008). Wireless sensor network survey. Computer Networks, 52(12), 2292–2330.

    Article  Google Scholar 

  2. Chang, J.-H., & Tassiulas, L. (2000). Energy conserving routing in wireless ad hoc networks. In Proceedings of IEEE infocom 2000, Tel Aviv, Israel, Vol. 1, pp. 22–31, March 26–30.

  3. Cheng, Z., Perillo, M., & Heinzelman, W. B. (2008). General network lifetime and cost models for evaluating sensor network deployment strategies. IEEE Transactions on Mobile Computing, 7(4), 484–497.

    Article  Google Scholar 

  4. Mak, N. H., & Seah, W. K. G. (2009). How long is the lifetime of a wireless sensor network? In Proceedings of the IEEE 23rd international conference on advanced information networking and applications, AINA 2009, Bradford, UK, pp. 763–770, May 26–29.

  5. Basagni, S., Carosi, A., Melachrinoudis, E., Petrioli, C., Wang, Z. M. (2008). Controlled sink mobility for prolonging wireless sensor networks lifetime. ACM/Springer Wireless Networks, 14(6), 831–858.

    Article  Google Scholar 

  6. Azad, A. P., & Chockalingam, A. (2006). Mobile base station placement and energy aware routing in wireless sensor networks. In Proceeding of the IEEE wireless communications and networking conference, WCNC 2006, Las Vegas, NV, Vol. 1, pp. 264–269, April 3–6.

  7. Gandham, S. R., Dawande, M., Prakash, R., & Venkatesan, S. (2003). Energy efficient schemes for wireless sensor networks with multiple mobile base stations. In Proceedings of IEEE globecom 2003, San Francisco, CA, Vol. 1, pp. 377–381, December 1–5.

  8. Ren, B., Ma, J., & Chen, C. (2006). The hybrid mobile wireless sensor networks for data gathering. In Proceedings of the ACM international conference on wireless communications and mobile computing, IWCMC 2006, Vancouver, BC, pp. 1085–1090, July 3–6.

  9. Chen, C., Ma, J., & Yu, K. (2006). Designing energy-efficient sensor networks with mobile sinks. In Proceedings of the 1st workshop on world-sensor-web: Mobile device centric sensory networks and applications, WSW 2006, Boulder, CO, October 31.

  10. Chatzigiannakis, I., Kinalis, A., Nikoletseas, S., & Rolim, J. (2007). Fast and energy efficient sensor data collection by multiple mobile sinks. In Proceedings of the 5th ACM international workshop on mobility management and wireless access, MobiWac 2007, Chania, Crete Island, pp. 25–32, October 22. ACM.

  11. Hillier, F. S., & Lieberman, G. J. (2005). Introduction to operations research (8th ed.). Boston, MA: McGraw Hill.

    Google Scholar 

  12. Chandru, V., & Rao, M. R. (1998). Linear programming. In M. Atallah (Eds.), Algorithms and theory of computation handbook. Boca Raton, FL: CRC Press.

    Google Scholar 

  13. Lovász, L., Grötschel, M., & Schrijver, A. (1981). The ellipsoid method and its consequences in combinatorial optimization. Combinatorica, 1, 169–197.

    Article  MATH  MathSciNet  Google Scholar 

  14. Motwani, R., O’Callaghan, L., & Zhu, A. (2007). Asymptotic polynomial-time approximation schemes. In G. Gonzalez (Eds.), Handbook of approximation algorithms and metaheuristics. Boca Raton, FL: CRC Press.

    Google Scholar 

  15. Schrijver, A. (1998). Theory of linear and integer programming. New York: Wiley.

    MATH  Google Scholar 

  16. Revelle, C., & Swain, R. (1970). Central facilities location. Geographical Analysis, 2, 30–42.

    Article  Google Scholar 

  17. Berry, J., Hart, W., Phillips, C., Uber, J., & Watson, J.-P. (2006). Sensor placement in municipal water networks with temporal integer programming models. Journal of Water Resources Planning and Management, 132, 218–224.

    Article  Google Scholar 

  18. Concorde TSP Solver. (2005). http://www.tsp.gatech.edu/concorde.html.

  19. Christofides, N. (1976). Worst-case analysis of a new heuristic for the travelling salesman problem. Technical report 388, Carnegie-Mellon University, Graduate School of Industrial Administration.

  20. ILOG, CPLEX Home Page. (2004). http://www.ilog.com/products/cplex/.

  21. Deitel, H. M., Deitel, P. J., Nieto, T. R., & McPhie, D. C. (2000). Perl how to program. Englewood Cliffs, NJ: Prentice Hall.

    Google Scholar 

  22. Gabow, H. N. (1973). Implementation of algorithms for maximum matching on non-bipartite graphs. PhD thesis, Stanford University, Department of Computer Science, Palo Alto, CA.

  23. The VINT Project. (2002). The ns manual. http://www.isi.edu/nsnam/ns/.

  24. IEEE Standard for Information Technology. (2003). Part 15.4: Wireless medium access control (MAC) and physical layer (PHY). Specifications for low-rate wireless personal area networks (LR-WPANs).

  25. ASH Transceiver Designer’s Guide. (2004). http://www.rfm.com, May 19, 2004.

  26. Gu, L., & Stankovic, J. A. (2005). Radio-triggered wake-up for wireless sensor networks. Real-Time Systems, 29(2–3), 157–182.

    Article  Google Scholar 

  27. Kolinko, P., & Larson, L. E. (2007). Passive RF receiver design for wireless sensor networks. In Proceeding of the IEEE/MTT-S international microwave symposium, IMS 2007, Honolulu, HI, pp. 567–570, June 3–8.

  28. Lu, G., De, D., Xu, M., Song, W.-Z., & Shirazi, B. (2009). A wake-on sensor network. In Proceedings of the 7th ACM conference on embedded networked sensor systems, SenSys 2009, pp. 341–342, November 4–6.

  29. Luo, J., & Hubaux, J.-P. (2005). Joint mobility and routing for lifetime elongation in wireless sensor networks. In Proceedings of IEEE infocom 2005, Miami, FL, Vol. 3, pp. 1735–1746, March 13–17.

Download references

Acknowledgments

The authors are grateful to Bob Carr of Sandia National Laboratories for useful comments on the topics of this paper. This work was partially supported by NSF grant #0738720 and by the FP7 EU project “SENSEI, Integrating the Physical with the Digital World of the Network of the Future,” Grant Agreement Number 215923, http://www.ict-sensei.org. Sandia is a multipurpose laboratory operated by Sandia Corporation, a Lockheed-Martin Company, for the United States Department of Energy’s National Nuclear Security Administration under contract DE-AC04-94AL85000.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chiara Petrioli.

Appendix: Computing transient configurations

Appendix: Computing transient configurations

A transition between configuration c i  ∈ C to configuration c j  ∈ C is legal if \(|c_{j} - c_{i}|\le s - |c_{i}|\). That is, in a legal transition, the number of sites that receive new active sinks in the new configuration does not exceed the number of inactive sinks in the preceding configuration. The inactive sinks can move to the new sites during the time configuration c i holds. In addition we require that at least one sink is active at all times.

We now show that we can transition between any pair of major configurations using at most two transient configurations.

Theorem 1

At most two transient configurations suffice to move from any major configuration to the following one.

Proof

Suppose we wish to transition from configuration c i  ∈ C to c j  ∈ C where \(c_i \neq c_j\). There are only three possible cases for the number of transient configurations between c i and c j :

  1. 1.

    \(c_i \subset c_{j}\) or \(c_{j} \subset c_i\). In this case, there are no transient configurations necessary since moving from c i to c j or vice versa satisfies our legal-transition criteria. If \(c_i \subset c_j\), then \(|c_j - c_i| = |c_j| - |c_i| \le s - |c_i|\), since \(|c_j| \le s\). If \(c_j \subset c_i,\,|c_j - c_i| = 0\,\le\,s - |c_i|\), since \(|c_i| \le s\).

  2. 2.

    \(c_i \not \subset c_j\) and \(c_j \not \subset c_i\), and either \(c_i \cap c_j \neq \emptyset\) or |c i | < s or |c j | < s. In this case, one transient configuration suffices. If \(c_i \cap c_j \neq \emptyset\), this intersection is a legal transient configuration c a i . From the argument for the previous case, we can move directly from configuration c i to \(c_i^a = c_i \cap c_j\) because \(c_i \cap c_j \subset c_i\). Similarly we can move directly from configuration c a i to c j because \(c_i^a = c_i \cap c_j \subset c_j\). If \(c_i \cap c_j = \emptyset\) but |c i | < s, then let c a i be any element of c j . Moving from c a i to c j is legal because \(c_i^a \subset c_j\). Since |c i | < s and configuration sizes are integers, we have \(s - |c_i| \,\ge\,1\). Moving from c i to c a i is legal because \(|c_i^a - c_i| = 1\,\le\,s - |c_i|\). A similar argument holds if |c j | < s.

  3. 3.

    \(c_i \not \subset c_j\) and \(c_j \not \subset c_i,\,c_i \cap c_j = \emptyset\) and \(|c_i| = |c_j| = s\). This covers all the remaining cases. Two transient configurations suffice. Let c a i be any nonempty proper subset of c i and let c b i be any nonempty proper subset of c j such that \(|c_i^a| + |c_i^b| = s\). We can move directly from configuration c i to c a i because \(c_i^a \subset c_i\). Similarly, we can move directly from c b i to c j because \(c_i^b \subset c_j\). We can move directly from c a i to c b i because \(|c_i^a - c_i^b| = |c_i^a| = s - |c_i^b|\). The first equality follows because \(c_i \cap c_j = \emptyset\) and \(c_i^a \subset c_i\) and \(c_i^b \subset c_j\). Thus \(c_i^a \cap c_i^b = \emptyset\). The second equality follows by construction.

\(\square\)

In the part of the proof of Theorem 1 concerning the case with one transient configuration, there were three separate sufficient conditions: \(c_i \cap c_{i+1} \neq \emptyset\) or |c i | < s or |c i+1| < s. Our argument that one transient configuration suffices used three different constructions for that transient configuration, one for each condition. However, these conditions and constructions are independent and fully compatible. We can combine all the pieces to get a transient configuration with a maximal number of active sinks. This heuristically minimizes the total energy the transient configuration requires per unit time.

A maximal legal configuration c a i for this case contains the sites in \(c_i \cap c_{i+1}\) plus s − |c i | elements of \(c_{i+1} - c_i\) and s − |c i+1| elements of \(c_i - c_{i+1}\). For example, suppose \(c_i = \{v_1, v_2, v_3\}\) and \(c_{i+1} = \{v_3, v_4, v_5\}\), with \(s\,=\,4\). Then a possible single transient state is \(c_i^a = \{v_2, v_3, v_4\}\). At the start of the transition, the one spare sink, not active during configuration c i , has finished traveling to location v 4. To move to configuration c a i , the sink waiting at site v 4 activates while the sink at location v 1 deactivates and begins moving to location v 5. When the traveling sink arrives at v 5, it activates, while the (now spare) sink at location v 2 deactivates to put the system in configuration c i+1.

The specific way we construct a single transient configuration between c i and c i+1 in step 4 of the centralized heuristic is to include the entire intersection \(c_i \cap c_{i+1}\) plus s − |c i | randomly selected sites from \(c_{i+1} - c_i\) and s − |c i+1| randomly selected sites from \(c_i - c_{i+1}\). There may be some advantage to making more clever choices for the spare sinks, but this case rarely arises. In practice, if a configuration does not use all s sinks, it is almost always a pure subset of at least one other configuration.

If configurations c i and c i+1 have no site in common and both have size s, we compute two transient configurations as in the proof of Theorem 1. That is, we will choose c a i a nonempty proper subset of c i and c b i a nonempty proper subset of c i+1 such that \(|c_i^a| + |c_i^b| = s\). For example, in Fig. 1, both configurations c i and c i+1 use all 6 possible sinks. \(c_i^a = \{v_1, v_3, v_5\}\) and \(c_i^b = \{v_7, v_9, v_{11}\}\). To make the transition, the sinks at sites in \(c_i - c_i^a\) move first to locations in c b i while those in c a i stay where they are to receive data. Then the sinks in c a i move to their final positions while those in c b i receive data. There are many possible ways to choose c a i as a subset of c i and c b i as a suitably-sized subset of c i+1. We now describe one way to pick these sets and argue why heuristically we might expect it to perform well compared to using an arbitrary pair of sets that satisfy our constraints.

To create the transient configurations between major configurations c i and c i+1, we first consider configuration c i . We estimate the distance between each pair of sink sites in c i . We then construct a complete graph that has a node for each site in c i , and edges weighted by this pairwise distance estimate. We find a minimum-weight maximum-cardinality matching in this graph. We then pick an element from each matched pair arbitrarily to form the set of sink sites c a i . For instance, in the upper left corner of Fig. 1, lines show the matching for configuration c i . The configuration \(c_i^a = \{v_1, v_3, v_5\}\) is the unboxed element of each matched pair. The set of sink sites to move first is \(M_1 = c_i - c_i^a = \{v_2, v_4, v_6\}\). To move from c i to c a i , the sinks at sites in M 1 deactivate and begin to move while those in c a i stay to receive traffic. We hope that if sites v i and v j are matched and a sink at site v i deactivates to move, the nodes sending to v i will be redirected to the nearby site v j , maintaining an energy consumption pattern among nodes that is similar to that of configuration c i . We then compute a similar matching in c i+1 and use that to pick the new locations M 2 for the sinks from sites in M 1 to move to. Thus \(c_i^b = M_2\). We hope c b i approximates the energy balance of configuration c i+1.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Basagni, S., Carosi, A., Petrioli, C. et al. Coordinated and controlled mobility of multiple sinks for maximizing the lifetime of wireless sensor networks. Wireless Netw 17, 759–778 (2011). https://doi.org/10.1007/s11276-010-0313-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-010-0313-8

Keywords

Navigation